STEALTHbits Technologies

Category: Content
Type: Youtube Video

Generated 1 week ago

STEALTHbits Technologies

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • 5 Steps for Adopting Privileged Local Account Auditing Best Practices

    In listening to Brad Bussie’s recent webinar, I learned that securing privileged access is a complex and serious problem for organizations of any size. In a recent cybersecurity study by Praetorian, they ranked privileged system access among the top five most prevalent threats to corporate data. Why? Because system-level access has sprawled significantly over the years and most organizations have ...

STEALTHbits Technologies

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • Take Action Against Ransomware

    After identifying nefarious activity on your file servers, whether it’s massive data theft or activity associated with ransomware, taking action is the next step. StealthINTERCEPT v4.0 now gives us the tools to automatically Lockdown those critical file areas once the rule for the File System Attacks Analytic is met. Let’s get started. First, we need to select the File System Attack Analytic, then...

  • Eliminate the Threat of Ransomware

    Knowledge and understanding are everything in the fight against ransomware, so before we go any further, you should check out these two previous STEALTHbits blog posts: Protecting against Ransomware The five most prevalent threats to corporate data Understanding the basics of how ransomware works and the motivations behind it is essential to fight the threat. And yet, even after so many high profi...

  • Ransomware: Get to the Point.

    The proliferation of ransomware continues apace, which is no surprise given the motivation is monetary.  Wherever there’s something of value that can be exploited, it will be exploited. Every organization has to take the threat of ransomware seriously and address the risk head-on. Where do you start?  You start with the basics: understanding what’s at risk and key ways to protect it.  What’s at ri...

STEALTHbits Technologies

Category: Content
Type: Blog Article

Generated 3 weeks ago

New blog articles detected

  • The “Five Most Prevalent Threats to Corporate Data”

    Of the hundreds (if not thousands) of blog posts and news articles published about cybersecurity every week, occasionally you come across a gem like this post by Kevin Jackson on Sys-Con.com called “For Top Cyber Threats, Look in the Mirror”. I highly suggest you give it a read -> http://news.sys-con.com/node/3943325 To break it down simply, Jackson’s article focused on a recent report released by...

  • Effective Nested Group Membership Changes

    Real-Time Auditing of the Classic Insider Threat A Russian Nesting Doll?  What a bizarre choice of image to accompany a technology blog, you may think.  In the same way that you can’t determine what is contained within a nest of Russian Dolls, without opening them up, Active Directory doesn’t reveal exactly who is a member of a group if that membership is through group nesting. StealthINTERCEPT 4....

  • StealthAUDIT Feature Pack: Best Practice Reports Now Available for Active Directory, Desktop and Server Infrastructure

    StealthAUDIT is offering an exciting update on Wednesday with its first official Feature Pack. In this first feature pack, we are focusing on Active Directory and Systems Best Practices for Security and Operations. Let’s look at each in more detail. Active Directory Best Practices Active Directory (AD) provides authentication and authorization services for the majority of IT systems. AD is growing...

  • Operations and Security: An Amicable Separation?

    Active Directory Operations and Security As the primary authentication and authorization service for the majority of IT systems, the importance of Microsoft’s Active Directory (AD) cannot be understated. Over time, AD has grown increasingly complex, less secure, and more difficult to manage, resulting in a growing problem for organizations large and small. Given its importance, AD is often viewed ...

  • Increase Insight into Your Active Directory Environment

    StealthAUDIT for Active Directory provides reporting features that give you great insight into your directory environment, but is there more usable information in a report than what is displayed by default? Yes. Most StealthAUDIT Jobs collect and record additional information that is not necessarily included in the default presentation of reports. However, recent improvements to the report interfa...

  • Version 4.0 of StealthINTERCEPT is now available

    StealthINTERCEPT v4.0 is now generally available and it’s loaded with exciting new features and enhancements for every StealthINTERCEPT user to leverage, including: Authentication Blocking Operation-level Monitoring for Exchange Mailboxes Automatic File System Activity Blocking Learn more by watching this brief video:   StealthINTERCEPT Customers: Contact support@stealthbits.com with questions or ...

  • 5 Steps for Cleaning up Active Directory

    Brad Bussie presented a great webinar a couple weeks ago and laid out a simple, straightforward 5-step plan for  Active Directory (AD) Clean-up.  We’ve gotten so much positive feedback on his webinar, that I thought I summarize some of the key takeaways for those of you who weren’t able to attend.  (You can also listen to an on-demand replay of the webinar here.) For many organizations, Active Dir...

  • Microsoft Exchange, Operation-Level Auditing: Auditing the Insider Threat

    Do you have sensitive data in your Exchange mailbox? What would happen if your mailbox was accessed with malicious intent? The first step to mitigating your risk is to know if an unauthorized person has accessed your mailbox.  You don’t need to know what the burglar is trying to steal to know they’re in your house.  The next question, however, is not who, but what. In my previous blog post about m...

  • Market Trends: ‘Millions of Email Accounts Compromised…’

    ‘Millions of Email Accounts Compromised…’ – The Daily Telegraph (UK), May 2016 This was the headline in a UK news outlet discussing a ‘…massive data breach that includes Google and Yahoo’.  It’s a catchy headline for sure. However, the line that really caught my attention was from the lead paragraph: ‘More than 270 Million email accounts with major providers around the world have been compromised…...

  • STEALTHbits ProTip: Identifying Non-Owner Exchange Activity

    Need visibility into the mailbox activity by anyone other than the owner of a specific mailbox? In this ProTip, you will learn how to view Exchange Activity within StealthINTERCEPT and how to scope the policy to view only Non-Owner activity. Once you are licensed for Exchange Activity, you will need to ensure that you have agents deployed to all Exchange Role Hosts (HUB, CAS, & MBX). This is done ...

STEALTHbits Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Has My Information Been Compromised? Probably!

    It’s your worst fears come true. You try to log onto your LinkedIn account. Maybe it’s Tumblr or even your Dropbox profile. Perhaps you’ve been thawed out after being cryogenically frozen for the last 10 years and attempt to access a new, Tom-less Myspace. But all of them return an error. Your password has been changed. Spam messages start flowing from your hijacked account, flooding your news fee...

  • 5 Steps to Building a Successful Data Access Governance (DAG) Program

    In listening to Adam Rosen’s recent webinar, I learned that nearly 60 percent of security breaches involve the theft of unstructured data.[i] And, only 12 percent of organizations are confident they can detect a breach involving unstructured data.[ii] Given that 80% of an organization’s data is unstructured,[iii] is it any wonder a hacker was able to steal login credentials and personal informatio...

STEALTHbits Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Political Hacks (The Cyber Kind): Colin Powell and the DNC

    In politics, information is power. Just one small comment or suggestion from a candidate or figure held in high esteem can potentially sway entire elections. Politicians also hold access to a treasure trove of sensitive information, not intended for the masses. That’s why Hillary Clinton’s private server fiasco is such a big deal in the eyes of many. But with the leaks of the Democratic National C...

STEALTHbits Technologies

Category: Content
Type: Blog Article

Generated 3 months ago

STEALTHbits Technologies

Category: Conversion
Type: Landing Page

Generated 5 months ago

STEALTHbits Technologies

Category: Conversion
Type: Landing Page

Generated 5 months ago

STEALTHbits Technologies

Category: Conversion
Type: Landing Page

Generated 5 months ago

STEALTHbits Technologies

Category: Conversion
Type: Landing Page

Generated 5 months ago

STEALTHbits Technologies

Category: Conversion
Type: Landing Page

Generated 5 months ago

STEALTHbits Technologies

Category: Conversion
Type: Landing Page

Generated 5 months ago

STEALTHbits Technologies

Category: Conversion
Type: Landing Page

Generated 5 months ago

STEALTHbits Technologies

Category: Conversion
Type: Landing Page

Generated 7 months ago

STEALTHbits Technologies

Category: Conversion
Type: Landing Page

Generated 7 months ago

STEALTHbits Technologies

Category: Conversion
Type: Landing Page

Generated 7 months ago

Shall we increase our level of intimacy?

40,833,135 ideas and insights to help you find what’s next.

Log in Sign up

Shall we increase our level of intimacy?

40,833,135 ideas and insights to help you find what’s next

Create Free Account

Already a user?  Log in